Link: How to Setup your own Proxy Server for Free [Updated]

Do a Google search like “proxy servers” and you’ll find dozens of PHP proxy scripts on the Internet that will help you create your own proxy servers in minutes for free. The only limitation with PHP based proxies is that they require a web server (to host and run the proxy scripts) and you also need a domain name that will act as an address for your proxy site.

If you don’t have a web domain or haven’t rented any server space, you can still create a personal proxy server for free and that too without requiring any technical knowledge.

YouTube Video Link: How to Create a Proxy Server

Full article here:
How to Setup your own Proxy Server for Free [Updated] (Digital Inspiration)

Link: Mosh – A replacement for SSH

Mosh(mobile shell) is Remote terminal application that allows roaming, supports intermittent connectivity, and provides intelligent local echo and line editing of user keystrokes.

Mosh is a replacement for SSH. It’s more robust and responsive, especially over Wi-Fi, cellular, and long-distance links.

Mosh is free software, available for GNU/Linux, FreeBSD, Solaris, Mac OS X, and Android.

YouTube video link: Mosh: An Interactive Remote Shell for Mobile Clients

Full article here:
Mosh – A replacement for SSH (Ubuntu Geek)

Link: Run Automated Scripts Over SSH

We’ve shown you how to use SSH to transfer files securely. But there’s a major issue with SSH’s default behaviour. You are only connected with the remote machine after you’ve manually entered the password which rules it out for any tasks you want to run unattended. Or does it?

Here’s a quick lowdown on how the OpenSSH CLI tools (scp and sftp) work so that you can better appreciate the issue. When you want to copy over files to or from the remote host, you can use scp which automatically initiates a SSH connection to the remote host. Every time you run a scp command it establishes a new connection to the remote. So if you have multiple scp commands you’d be entering the same password several times.

This is why you wouldn’t want to use scp in any scripts you want to run unattended. There’s also the fact that if you have multiple accounts on several machines on the network, you’d have trouble memorizing unique, strong passwords for each.

To overcome this problem, you need to switch OpenSSH’s default authentication mechanism to a key-based system.

Full article here:
Run Automated Scripts Over SSH (Make Tech Easier)

Link: Debian and Ubuntu Linux: Set openssh SeverKeyBits to 1024

The upstream openssh project sets the value ServerKeyBits to 1024, but Debian and Ubuntu currently unfortunately have a lower security setting of 768 bits. I’ve filed a bug to fix this. In the meantime, here is how to make that change now!

Full article here:
Debian and Ubuntu Linux: Set openssh SeverKeyBits to 1024 (scottlinux.com)

Link: What is Cryptolocker and How Do You Prevent It?

Recently, a new piece of malware has been wreaking havoc online, locking innocent users out of their files and demanding money. Cryptolocker is a form of virus known as “ransomware” – a variety that attempts to extort money in exchange for providing users with what they already own, but can no longer access.

So what is it about Cryptolocker that changes the game, and how do you prevent yourself from falling victim to this vile threat. That is precisely what we want to look at today.

Full article here:
What is Cryptolocker and How Do You Prevent It? (Make Tech Easier)

We would also add that frequent backups to media that is not connected 24/7 is probably a good idea. If you backup to something that requires a user name and password to access, and it’s not already connected at the time the attack occurs, then that data is probably safe. If you happen to have a recent backup made using something like Redo Backup and Recovery, then should an attack like this occur, you can simply wipe the drive clean and reformat it, then restore from your backup and get most of your files back. But that only works if you make the backup before your system is infected, and only if the attacker can’t access your backup file and corrupt that. So if you choose to backup to a network share, make sure it’s a share that you must log into using a strong password before you can access it, and that it’s NOT a share that you normally stay connected to during day-to-day use!

Link: How to make unprivileged programs listen on privileged ports

Here’s a quick tutorial on how to make unprivileged programs listen on privileged ports. The trick here is to make the unprivileged program to listen on an unprivileged port and redirect the privileged port to the unprivileged through iptables.

Full article here:
How to make unprivileged programs listen on privileged ports (catonmat.net)

Link: Best Password Managers for Linux

A password manager helps you manage all your passwords in one safe place so that you won’t have to remember them individually. It makes your job easier by letting you look up any stored password instantly and then use it. Furthermore, you also get to create new, secure passwords that are very hard to break. And here’s the best part: all these features are at zero cost. Absolutely free!

So, if you’re looking for some of the best password managers for your Linux desktop, here’s a list of the best ones:

Full article here:
Best Password Managers for Linux (TechSource)

Link: How To Protect SSH with fail2ban on Debian 7

Having a server or computer connected to a network comes with a certain amount of risk. Any machine, including a VPS, connected to the internet is a potential target for malicious attacks.

While having a well-configured firewall will prevent many kinds of illegitimate access, you still need to open up certain services to allow yourself the ability to log in and administer the server. SSH is the service most commonly used to log into remote systems, and so it also is one of the most frequently targeted.

Fortunately, there is a tool available that can mitigate this attack vector, called fail2ban. This can be configured to allow legitimate logins using SSH, but ban IP addresses after they have failed to authenticate correctly after a set number of times.

Full article here:
How To Protect SSH with fail2ban on Debian 7 (DigitalOcean)

Link: arkOS: Building the anti-cloud (on a Raspberry Pi)

arkOS is an open source project designed to let its users take control of their personal data and make running a home server as easy as using a PC

…..

arkOS is not a solution to the surveillance state, but it does offer an alternative to those who would rather exercise some measure of control over their data and, at the very least, not lock away their information in online services where its retrieval and use is at the whim of a corporation, not the user.

Full article here:
arkOS: Building the anti-cloud (on a Raspberry Pi) (TechWorld)
Related article:
arkOS aims to let anyone host their own cloud with a $35 Raspberry Pi (Liliputing)

Link: MythWeb ssh tunnel howto [for MythTV users]

I am going to briefly describe how to connect to mythweb that is behind a firewall in a router. I will assume you have mythweb running. If you need help with that please see the mythweb documentation: http://www.mythtv.org/docs/ I will also assume that you know how to forward ports on your router. …..

Full article here:
MythWeb ssh tunnel howto (MythTV wiki)